edwinadidas4470 edwinadidas4470 13-02-2024 Computers and Technology contestada How can public-key encryption be used to distribute a secret key? Provide a real-world example.